Background: Trauma to the anterior teeth is a common injury in young children. Themaxillary incisors being the most affected. Although root fractures are rare, theydo occur and were previously and often considered hopeless and were extracted.The time between the injury and the initiation of treatment, level of the fractureline, and stage of root development are some criteria to be considered whenchoosing a treatment approach for a complicated tooth fracture. This case reportdescribes the management of a traumatized immature maxillary central incisorwith Elise class IV fracture with vertical oblique subgingival fracture of the root.Materials and method: Apexification was carried out using biodentine followed byremoval of the fractured segment. A fiber post was cemented in the root canalwith resin cement. The coronal portion of the tooth was restored using anteriorlight cured composite material. The tooth was examined and evaluated after 1week and after 2 months by clinical examination and radiographical evaluation ofroot development.Results: The follow up evaluation revealed clinical and radiographical success.Radiographic view showed continued development in the apex of the root andshowed normal periodontal ligament space and dense lamina dura.Conclusion: Extraction should not be the first choice of treatment for extensivelydamaged young permanent teeth in the anterior region; instead, alternativetreatment modalities must be considered. The traumatized immature tooth wassaved and restored.
Global virtual teams (GVTs) are a recent organizational adaptation created to meet the needs of globalizatized marketplace. GVTs are essentially teams that are distributed across national boundaries and concerned through advanced information and communication technology (ICT) such as email, instant messaging, and video conferencing. The research on GVTs is important in the information system (IS) field because GVTs are dependent on information communication technology and the use of other technologies; GVTs also consists of people from different cultures. This paper tried to answer two research questions. The first one is: what are the GVTs problems facing the project manager (PM). A literature review was conducted to answer the fir
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreGenetic algorithms (GA) are a helpful instrument for planning and controlling the activities of a project. It is based on the technique of survival of the fittest and natural selection. GA has been used in different sectors of construction and building however that is rarely documented. This research aimed to examine the utilisation of genetic algorithms in construction project management. For this purpose, the research focused on the benefits and challenges of genetic algorithms, and the extent to which genetic algorithms is utilised in construction project management. Results showed that GA provides an ability of generating near optimal solutions which can be adopted to reduce complexity in project management and resolve difficult problem
... Show MoreAll domains in this world built based on set of theories. Those theories have been responsible for interpretation of some phenomena and interlocking relationships around us. Commonly, theories are categorized by which aspect is believed. Also,can find a group of theories produced regardingto the leadership domain. This paper will be presented some of these theories like (Great Man Theory, Trait Theory, Behavioral Theories, Contingency Theories, Situational Theory, Transactional Theories, and Transformational Theories). where these theories considered the most popular and common in the field of leader and will be discussed by this work
For the duration of the last few many years many improvement in computer technology, software program programming and application production had been followed with the aid of diverse engineering disciplines. Those trends are on the whole focusing on synthetic intelligence strategies. Therefore, a number of definitions are supplied, which recognition at the concept of artificial intelligence from exclusive viewpoints. This paper shows current applications of artificial intelligence (AI) that facilitate cost management in civil engineering tasks. An evaluation of the artificial intelligence in its precise partial branches is supplied. These branches or strategies contributed to the creation of a sizable group of fashions s
... Show MoreThe research aims to identify the availability of some basic competencies that are required to be available to workers in digital agricultural Extension from the point of view of senior management, middle management, and, employees with Post-graduate education degrees, represented by the following: Transition to digital agricultural Extension for sustainable and smart family farms, benefiting from international expertise and experiences in applying for Digital agricultural Extension, preparing and implementing Extension messages through platforms, factors affecting the effectiveness of digital agricultural Extension and its platforms, following up and evaluating the activities and programs of the digital Extension platform. The research pop
... Show MoreA field study aimed at identifying the reality of the application of strategic management in the colleges of education/ University of Baghdad. The research adopted the descriptive analytical approach. The research community, consisting of 801 faculty teachers, has been identified. The research sample was selected in a simple random way and represented 15% of the research community, totalling 124 teaching members. A questionnaire was constructed that included (46) items divided between areas (strategic objectives, strategy planning and formulation, implementation of the strategy, and evaluation of the strategy). The honesty and consistency of the tool was verified. The researcher analyzed the research data using SPSS. The most important resu
... Show MoreRecently, Knowledge Management Systems (KMS) consider one of the major fields of study in educational institutions, caused by the necessity to identify their knowledge value and success. Hence, based on the updated DeLone and McLean’s Information Systems Success Model (DMISSM), this study set out to assess the success of the Perceived Usefulness of Knowledge Management Systems (PUKMS) in Iraqi universities. To achieve this objective, the quantitative method is selected as the research design. In total, 421 university administration staff members from 13 Iraqi private universities were conducted. This study highlights a number of significant results depending on structural equation modeling which confirms that system, information, and s
... Show More